Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp372566pxx; Wed, 28 Oct 2020 06:58:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx5Q7SR/v0GGhu5kUXdY7kYll8XWFAKvI9DH7DtAGNaYxqosAsAZplHbmq6vUlnZaqW8h5l X-Received: by 2002:a17:906:9247:: with SMTP id c7mr6766191ejx.324.1603893502966; Wed, 28 Oct 2020 06:58:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603893502; cv=none; d=google.com; s=arc-20160816; b=OIQ2REUrW2CPGQXJX/HQh3JJhY6u0RIkUaV2rsyNdkPKkZZJS4j+rcN154CGT5xFJZ uwxUn3j67Nwu8uiM94i6FTg8WswVo2wnGmmLLjaeWmYEw4nu7rXlEVBGPsPF8hWrj+Dz BBiIHO9pbWrQtldAdy8QbcJwi0j2d4so11brxbkV7x5/LY6UJmvUvolLxgbv90lMoQmt ZUryRIdYILeVXb5Xh9ZfoXvX4cJrHyaNJEDcMHELcC+F4CSaEDtXfVSlU9chD7eSprg2 EHDp0K8Z46qU0c2KGpGrjpOCzDaNRjOJCyVVQ20Lzfvl9eJ4HXW1uzC8iwfUA7U949mQ rPjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=D4TQepnwp4B0XlIxjtjPkbI3SW4ob96OAR1Su3WL4KM=; b=vH5QXw9r3NY99P25Jl27r9WN8Tww2p9a1l+eqOSBKS3LDXgnf3PUN1ptCmX0co5PS/ LNW6jBBc8AknWdF9IyEbbZz0VJQ86baFyxcGU5btRkd9pHASAkOTW9688xYOSkPxntqk k+gW86nFNR5qcO1BJcq+dv8kToLoAokI8ExDHhx0OCcr4ZOx5GzeRlJjUrsoR5mOmXym eZysYEBmKxTosRF4UEPzlWVTUjVj5oblcxR6PEKyh6vvnOGUvlZ9Mvdc0EQxVtBGg67n RCS97IxNj9yA5SlTAmXpwH/uMs56nDiP2FqaYklosl5G+z5hqjlyivRwiMmBKmqGha6d VNyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vNVG8MJD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gf17si2900638ejb.226.2020.10.28.06.58.00; Wed, 28 Oct 2020 06:58:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vNVG8MJD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1803587AbgJ0PxI (ORCPT + 99 others); Tue, 27 Oct 2020 11:53:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:58380 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1801080AbgJ0PjB (ORCPT ); Tue, 27 Oct 2020 11:39:01 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8F549207C3; Tue, 27 Oct 2020 15:39:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603813141; bh=W5U8oER/VUgPWT4SRu7XPlajT8RhgXPzz7T0GIU43uo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vNVG8MJDxFbTVRN7zQybw1cpRulOJnu8gOb1rTxndQDd+evN0UpNdAtKNeUwJAUFu zgXKjzavVKRayCeooyg2iPXi1VT8cWptrsMPYYGWi49wRGPa+G2RWA11XhE//3LYWX 4ET5ysmLyFaCk4Y3S6rh8pmmHVoOtQ5pScp0pNV8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Leon Romanovsky , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.9 452/757] RDMA/cma: Combine cma_ndev_work with cma_work Date: Tue, 27 Oct 2020 14:51:42 +0100 Message-Id: <20201027135511.731690648@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Gunthorpe [ Upstream commit 7e85bcda8bfe883f4244672ed79f81b7762a1a7e ] These are the same thing, except that cma_ndev_work doesn't have a state transition. Signal no state transition by setting old_state and new_state == 0. In all cases the handler function should not be called once rdma_destroy_id() has progressed passed setting the state. Link: https://lore.kernel.org/r/20200902081122.745412-6-leon@kernel.org Signed-off-by: Leon Romanovsky Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/core/cma.c | 38 +++++++---------------------------- 1 file changed, 7 insertions(+), 31 deletions(-) diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c index 5888311b21198..9c3cb8549ac72 100644 --- a/drivers/infiniband/core/cma.c +++ b/drivers/infiniband/core/cma.c @@ -363,12 +363,6 @@ struct cma_work { struct rdma_cm_event event; }; -struct cma_ndev_work { - struct work_struct work; - struct rdma_id_private *id; - struct rdma_cm_event event; -}; - struct iboe_mcast_work { struct work_struct work; struct rdma_id_private *id; @@ -2647,32 +2641,14 @@ static void cma_work_handler(struct work_struct *_work) struct rdma_id_private *id_priv = work->id; mutex_lock(&id_priv->handler_mutex); - if (!cma_comp_exch(id_priv, work->old_state, work->new_state)) + if (READ_ONCE(id_priv->state) == RDMA_CM_DESTROYING || + READ_ONCE(id_priv->state) == RDMA_CM_DEVICE_REMOVAL) goto out_unlock; - - if (cma_cm_event_handler(id_priv, &work->event)) { - cma_id_put(id_priv); - destroy_id_handler_unlock(id_priv); - goto out_free; + if (work->old_state != 0 || work->new_state != 0) { + if (!cma_comp_exch(id_priv, work->old_state, work->new_state)) + goto out_unlock; } -out_unlock: - mutex_unlock(&id_priv->handler_mutex); - cma_id_put(id_priv); -out_free: - kfree(work); -} - -static void cma_ndev_work_handler(struct work_struct *_work) -{ - struct cma_ndev_work *work = container_of(_work, struct cma_ndev_work, work); - struct rdma_id_private *id_priv = work->id; - - mutex_lock(&id_priv->handler_mutex); - if (id_priv->state == RDMA_CM_DESTROYING || - id_priv->state == RDMA_CM_DEVICE_REMOVAL) - goto out_unlock; - if (cma_cm_event_handler(id_priv, &work->event)) { cma_id_put(id_priv); destroy_id_handler_unlock(id_priv); @@ -4656,7 +4632,7 @@ EXPORT_SYMBOL(rdma_leave_multicast); static int cma_netdev_change(struct net_device *ndev, struct rdma_id_private *id_priv) { struct rdma_dev_addr *dev_addr; - struct cma_ndev_work *work; + struct cma_work *work; dev_addr = &id_priv->id.route.addr.dev_addr; @@ -4669,7 +4645,7 @@ static int cma_netdev_change(struct net_device *ndev, struct rdma_id_private *id if (!work) return -ENOMEM; - INIT_WORK(&work->work, cma_ndev_work_handler); + INIT_WORK(&work->work, cma_work_handler); work->id = id_priv; work->event.event = RDMA_CM_EVENT_ADDR_CHANGE; cma_id_get(id_priv); -- 2.25.1